{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T03:53:48Z","timestamp":1778558028280,"version":"3.51.4"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T00:00:00Z","timestamp":1766102400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T00:00:00Z","timestamp":1766102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s11235-025-01388-7","type":"journal-article","created":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T19:11:38Z","timestamp":1766171498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["URLMoE: leveraging multi-head attention and expert specialization for robust malicious URL classification"],"prefix":"10.1007","volume":"89","author":[{"given":"Fatin A.","family":"Elhaj","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taqwa A.","family":"Alhaj","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shamiel H.","family":"Ibrahim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Omayma","family":"Husain","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tariq M.","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tasneem","family":"Darwish","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,12,19]]},"reference":[{"key":"1388_CR1","doi-asserted-by":"crossref","unstructured":"Ray, K.S., Kusshwaha, R. (2021). Detection of malicious urls using deep learning approach. The\" Essence\" of Network Security: An End-to-End Panorama, 189\u2013212","DOI":"10.1007\/978-981-15-9317-8_8"},{"issue":"1","key":"1388_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.3390\/electronics13010030","volume":"13","author":"S Asiri","year":"2023","unstructured":"Asiri, S., Xiao, Y., & Li, T. (2023). Phishtransformer: A novel approach to detect phishing attacks using url collection and transformer. Electronics, 13(1), 30.","journal-title":"Electronics"},{"key":"1388_CR3","doi-asserted-by":"crossref","unstructured":"Babakian, A., Huston, G., Braun, R., Lipman, J. (2024). Internet identifiers: A survey of history, challenges, and future perspectives. IEEE Access","DOI":"10.1109\/ACCESS.2024.3382115"},{"key":"1388_CR4","unstructured":"Sahoo, D., Liu, C., Hoi, S.C. (2017). Malicious url detection using machine learning: A survey. arXiv preprint arXiv:1701.07179"},{"key":"1388_CR5","doi-asserted-by":"crossref","unstructured":"Rafsanjani, A.S., Kamaruddin, N.B., Behjati, M., Aslam, S., Sarfaraz, A., Amphawan, A. (2024). Enhancing malicious url detection: A novel framework leveraging priority coefficient and feature evaluation. IEEE Access","DOI":"10.1109\/ACCESS.2024.3412331"},{"key":"1388_CR6","doi-asserted-by":"crossref","unstructured":"Do\u00a0Xuan, C., Nguyen, H.D., Tisenko, V.N. (2020). Malicious url detection based on machine learning. International Journal of Advanced Computer Science and Applications 11(1)","DOI":"10.14569\/IJACSA.2020.0110119"},{"key":"1388_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102638","volume":"113","author":"R Liu","year":"2025","unstructured":"Liu, R., Wang, Y., Xu, H., Qin, Z., Zhang, F., Liu, Y., & Cao, Z. (2025). Pmanet: Malicious url detection via post-trained language model guided multi-level feature attention network. Information Fusion, 113, Article 102638.","journal-title":"Information Fusion"},{"issue":"1","key":"1388_CR8","first-page":"3241216","volume":"2022","author":"M Aljabri","year":"2022","unstructured":"Aljabri, M., Alhaidari, F., Mohammad, R. M. A., Mirza, S., Alhamed, D. H., Altamimi, H. S., & Chrouf, S. M. B. (2022). An assessment of lexical, network, and content-based features for detecting malicious urls using machine learning and deep learning models. Computational Intelligence and Neuroscience, 2022(1), 3241216.","journal-title":"Computational Intelligence and Neuroscience"},{"issue":"1","key":"1388_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1504\/IJICS.2024.136735","volume":"23","author":"T Nagunwa","year":"2024","unstructured":"Nagunwa, T. (2024). Ai-driven approach for robust real-time detection of zero-day phishing websites. International Journal of Information and Computer Security, 23(1), 79\u2013118.","journal-title":"International Journal of Information and Computer Security"},{"key":"1388_CR10","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M. (2009). Identifying suspicious urls: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, 681\u2013688","DOI":"10.1145\/1553374.1553462"},{"key":"1388_CR11","doi-asserted-by":"crossref","unstructured":"Al\u00a0Siam, A., Alazab, M., Awajan, A., Faruqui, N. (2025). A comprehensive review of ai\u2019s current impact and future prospects in cybersecurity. IEEE Access","DOI":"10.1109\/ACCESS.2025.3528114"},{"key":"1388_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102414","volume":"110","author":"A Alhogail","year":"2021","unstructured":"Alhogail, A., & Alsabih, A. (2021). Applying machine learning and natural language processing to detect phishing email. Computers & Security, 110, Article 102414.","journal-title":"Computers & Security"},{"key":"1388_CR13","doi-asserted-by":"publisher","first-page":"65703","DOI":"10.1109\/ACCESS.2022.3183083","volume":"10","author":"S Salloum","year":"2022","unstructured":"Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2022). A systematic literature review on phishing email detection using natural language processing techniques. IEEE Access, 10, 65703\u201365727.","journal-title":"IEEE Access"},{"key":"1388_CR14","doi-asserted-by":"crossref","unstructured":"Kulkarni, A.D., Brown\u00a0III, L.L., et al. (2019). Phishing websites detection using machine learning","DOI":"10.14569\/IJACSA.2019.0100702"},{"key":"1388_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101494","volume":"91","author":"T Li","year":"2020","unstructured":"Li, T., Kou, G., & Peng, Y. (2020). Improving malicious urls detection via feature engineering: Linear and nonlinear space transformation methods. Information Systems, 91, Article 101494.","journal-title":"Information Systems"},{"key":"1388_CR16","doi-asserted-by":"crossref","unstructured":"Orozco, D., Quesada, L., Ramirez-Benavides, K., Lara, A. (2024). Real-time malicious url detection. In: 2024 IEEE Latin-American Conference on Communications (LATINCOM), 1\u20137. IEEE","DOI":"10.1109\/LATINCOM62985.2024.10770685"},{"key":"1388_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102967","volume":"62","author":"DK Mondal","year":"2021","unstructured":"Mondal, D. K., Singh, B. C., Hu, H., Biswas, S., Alom, Z., & Azim, M. A. (2021). Seizemaliciousurl: A novel learning approach to detect malicious urls. Journal of Information Security and Applications, 62, Article 102967.","journal-title":"Journal of Information Security and Applications"},{"key":"1388_CR18","doi-asserted-by":"crossref","unstructured":"Nazeeruddin, E., Latif, G., Mohammad, N. (2024). Malicious url detection and categorization using machine learning techniques. In: 2024 IEEE 16th International Conference on Computational Intelligence and Communication Networks (CICN), 676\u2013682. IEEE","DOI":"10.1109\/CICN63059.2024.10847544"},{"key":"1388_CR19","doi-asserted-by":"crossref","unstructured":"Hani, R.B., Amoura, M., Ammourah, M., Khalil, Y.A., Swailm, M. (2024). Malicious url detection using machine learning. In: 2024 15th International Conference on Information and Communication Systems (ICICS), 1\u20135. IEEE","DOI":"10.1109\/ICICS63486.2024.10638299"},{"issue":"3","key":"1388_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10462-024-11033-5","volume":"58","author":"Y Xu","year":"2025","unstructured":"Xu, Y., Khan, T. M., Song, Y., & Meijering, E. (2025). Edge deep learning in computer vision and medical diagnostics: a comprehensive survey. Artificial Intelligence Review, 58(3), 93.","journal-title":"Artificial Intelligence Review"},{"key":"1388_CR21","doi-asserted-by":"publisher","first-page":"219275","DOI":"10.1109\/ACCESS.2020.3041719","volume":"8","author":"TM Khan","year":"2020","unstructured":"Khan, T. M., & Robles-Kelly, A. (2020). Machine learning: Quantum vs classical. IEEE Access, 8, 219275\u2013219294.","journal-title":"IEEE Access"},{"key":"1388_CR22","first-page":"51","volume":"2019","author":"E Benavides","year":"2019","unstructured":"Benavides, E., Fuertes, W., Sanchez, S., & Sanchez, M. (2019). Classification of phishing attack solutions by employing deep learning techniques: A systematic literature review. Developments and Advances in Defense and Security: Proceedings of MICRADS, 2019, 51\u201364.","journal-title":"Developments and Advances in Defense and Security: Proceedings of MICRADS"},{"issue":"12","key":"1388_CR23","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.3390\/electronics10121492","volume":"10","author":"S-J Bu","year":"2021","unstructured":"Bu, S.-J., & Cho, S.-B. (2021). Deep character-level anomaly detection based on a convolutional autoencoder for zero-day phishing url detection. Electronics, 10(12), 1492.","journal-title":"Electronics"},{"key":"1388_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109494","volume":"119","author":"S Afzal","year":"2024","unstructured":"Afzal, S., Asim, M., Beg, M. O., Baker, T., Awad, A. I., & Shamim, N. (2024). Context-aware embeddings for robust multiclass fraudulent url detection in online social platforms. Computers and Electrical Engineering, 119, Article 109494.","journal-title":"Computers and Electrical Engineering"},{"key":"1388_CR25","unstructured":"Le, H., Pham, Q., Sahoo, D., Hoi, S.C. (2018). Urlnet: Learning a url representation with deep learning for malicious url detection. arXiv preprint arXiv:1802.03162"},{"issue":"27","key":"1388_CR26","doi-asserted-by":"publisher","first-page":"69345","DOI":"10.1007\/s11042-023-17993-0","volume":"83","author":"M Nanda","year":"2024","unstructured":"Nanda, M., & Goel, S. (2024). Url based phishing attack detection using bilstm-gated highway attention block convolutional neural network. Multimedia Tools and Applications, 83(27), 69345\u201369375.","journal-title":"Multimedia Tools and Applications"},{"key":"1388_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102372","volume":"108","author":"X Xiao","year":"2021","unstructured":"Xiao, X., Xiao, W., Zhang, D., Zhang, B., Hu, G., Li, Q., & Xia, S. (2021). Phishing websites detection via cnn and multi-head self-attention on imbalanced datasets. Computers & Security, 108, Article 102372.","journal-title":"Computers & Security"},{"issue":"11","key":"1388_CR28","doi-asserted-by":"publisher","first-page":"5552","DOI":"10.1109\/TIP.2019.2916757","volume":"28","author":"B Zhao","year":"2019","unstructured":"Zhao, B., Li, X., & Lu, X. (2019). Cam-rnn: Co-attention model based rnn for video captioning. IEEE Transactions on Image Processing, 28(11), 5552\u20135565.","journal-title":"IEEE Transactions on Image Processing"},{"key":"1388_CR29","doi-asserted-by":"crossref","unstructured":"Huang, Y., Yang, Q., Qin, J., Wen, W. (2019) Phishing url detection via cnn and attention-based hierarchical rnn. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), 112\u2013119. IEEE","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00024"},{"key":"1388_CR30","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K. (2019) Bert: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (long and Short Papers), 4171\u20134186","DOI":"10.18653\/v1\/N19-1423"},{"key":"1388_CR31","unstructured":"Matthew, E. (2018). Peters, mark neumann, mohit iyyer, matt gardner, christopher clark, kenton lee, luke zettlemoyer. deep contextualized word representations. In: Proc. of NAACL, 5"},{"key":"1388_CR32","unstructured":"Yu, F., Koltun, V. (2015). Multi-scale context aggregation by dilated convolutions. arXiv preprint arXiv:1511.07122"},{"key":"1388_CR33","unstructured":"Hendrycks, D., Gimpel, K. (2016). Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415"},{"key":"1388_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108159","volume":"121","author":"X Jin","year":"2022","unstructured":"Jin, X., Xie, Y., Wei, X.-S., Zhao, B.-R., Chen, Z.-M., & Tan, X. (2022). Delving deep into spatial pooling for squeeze-and-excitation networks. Pattern Recognition, 121, Article 108159.","journal-title":"Pattern Recognition"},{"key":"1388_CR35","unstructured":"Arevalo, J., Solorio, T., Montes-y-G\u00f3mez, M., Gonz\u00e1lez, F.A. (2017). Gated multimodal units for information fusion. arXiv preprint arXiv:1702.01992"},{"key":"1388_CR36","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems 30"},{"issue":"DB1","key":"1388_CR37","first-page":"1","volume":"2021","author":"PP Liang","year":"2021","unstructured":"Liang, P. P., Lyu, Y., Fan, X., Wu, Z., Cheng, Y., Wu, J., Chen, L., Wu, P., Lee, M. A., Zhu, Y., et al. (2021). Multibench: Multiscale benchmarks for multimodal representation learning. Advances in neural information processing systems, 2021(DB1), 1.","journal-title":"Advances in neural information processing systems"},{"key":"1388_CR38","doi-asserted-by":"publisher","first-page":"94557","DOI":"10.1109\/ACCESS.2021.3092735","volume":"9","author":"S Lee","year":"2021","unstructured":"Lee, S., Han, D. K., & Ko, H. (2021). Multimodal emotion recognition fusion analysis adapting bert with heterogeneous feature unification. IEEE access, 9, 94557\u201394572.","journal-title":"IEEE access"},{"issue":"4","key":"1388_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3608446","volume":"17","author":"C Zhao","year":"2023","unstructured":"Zhao, C., & Caragea, C. (2023). Deep gated multi-modal fusion for image privacy prediction. ACM Transactions on the Web, 17(4), 1\u201324.","journal-title":"ACM Transactions on the Web"},{"issue":"1","key":"1388_CR40","doi-asserted-by":"publisher","first-page":"15873","DOI":"10.1038\/s41598-023-41463-0","volume":"13","author":"C Hsieh","year":"2023","unstructured":"Hsieh, C., Nobre, I. B., Sousa, S. C., Ouyang, C., Brereton, M., Nascimento, J. C., Jorge, J., & Moreira, C. (2023). Mdf-net for abnormality detection by fusing x-rays with clinical data. Scientific Reports, 13(1), 15873.","journal-title":"Scientific Reports"},{"key":"1388_CR41","unstructured":"Oh, D., Kim, Y., Lee, H., Huang, H.H., Lim, H. (2022). Don\u2019t judge a language model by its last layer: Contrastive learning with layer-wise attention pooling. arXiv preprint arXiv:2209.05972"},{"key":"1388_CR42","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I. (2019). Sentence-bert: Sentence embeddings using siamese bert-networks. arXiv preprint arXiv:1908.10084","DOI":"10.18653\/v1\/D19-1410"},{"key":"1388_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117571","volume":"205","author":"T Wullach","year":"2022","unstructured":"Wullach, T., Adler, A., & Minkov, E. (2022). Character-level hypernetworks for hate speech detection. Expert Systems with Applications, 205, Article 117571.","journal-title":"Expert Systems with Applications"},{"key":"1388_CR44","doi-asserted-by":"crossref","unstructured":"Han, Z., Lin, S., Huang, Z., Guo, C. (2023). Named entity recognition for long covid biomedical literature by using bert-bilstm-idcnn-att-crf approach. In: Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 1200\u20131205","DOI":"10.1145\/3644116.3644319"},{"key":"1388_CR45","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A. (2015). Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"1388_CR46","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xu, C., Li, B., Chen, H., Xiao, T., Zhang, C., Zhu, J. (2023). Rethinking and improving multi-task learning for end-to-end speech translation. arXiv preprint arXiv:2311.03810","DOI":"10.18653\/v1\/2023.emnlp-main.663"},{"key":"1388_CR47","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.eswa.2018.09.029","volume":"117","author":"OK Sahingoz","year":"2019","unstructured":"Sahingoz, O. K., Buber, E., Demir, O., & Diri, B. (2019). Machine learning based phishing detection from urls. Expert Systems with Applications, 117, 345\u2013357.","journal-title":"Expert Systems with Applications"},{"key":"1388_CR48","doi-asserted-by":"crossref","unstructured":"Su, M.-Y., & Su, K.-L. (2023). Bert-based approaches to identifying malicious urls. Sensors, 23(20), 8499.","DOI":"10.3390\/s23208499"},{"key":"1388_CR49","unstructured":"Xu, P. (2021). A transformer-based model to detect phishing urls. arXiv preprint arXiv:2109.02138 newpage"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01388-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-025-01388-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01388-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T11:28:02Z","timestamp":1773228482000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-025-01388-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,19]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["1388"],"URL":"https:\/\/doi.org\/10.1007\/s11235-025-01388-7","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,19]]},"assertion":[{"value":"25 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"12"}}